Comprehensive Guide to Intelligence Gathering and Penetration Testing Stages
Understanding the importance of intelligence gathering in security and the stages of penetration testing - information gathering, scanning, exploitation, and reporting. Delve into tools like nslookup for server information and leverage Google Dorks for database vulnerabilities. Safeguard your systems against threats with insightful techniques and practices.
Uploaded on Sep 14, 2024 | 0 Views
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
Stages of penetration testing Gathering information Scanning Exploitation Reporting
Intelligence Gathering Intelligence gathering is an important aspect of security Threats are inevitable and your own systems could be a threat Only do this on your own systems! nslookup name server lookup, looks for name server information
https://www.exploit-db.com/google-hacking-database inurl:login.htm Downloadable database Google Dork : intitle:"index of" ".pem http://www.icreate3dmodelling.co.uk/wp- content/wpclone-temp/wpclone_backup/ inurl: "index.php?id= inurl:index of driver.php?id= inurl:login intext:"reset your password" inurl:"/wp-content/wpclone-temp/wpclone_backup/ "PHP Version" inurl:/php/phpinfo.php